[Free] 2017 Ensurepass Lead2Pass Microsoft 70-412 Actual Test 211-220

You have a cluster named Cluster1 that contains two nodes. Both nodes run Windows Server 2012 R2. Cluster1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. You configure a custom service on VM1 named Service1. You need to ensure that VM1 will be moved to a different node if Service1 fails. Which cmdlet should you run on Cluster1?

A.

Add-ClusterVmMonitoredItem

B.

Set-ClusterResourceDependency

C.

Enable- VmResourceMetering

D.

Add-ClusterGenericServiceRole

Correct Answer: A

Explanation:

* The Add-ClusterVMMonitoredItem cmdlet configures monitoring for a service or an Event Tracing for Windows (ETW) event so that it is monitored on a virtual machine. If the service fails or the event occurs, then the system responds by taking an action based on the failover configuration for the virtual machine resource. For example, the configuration migh
t specify that the virtual machine be restarted or failover.

* The decision on whether to failover or restart on the same node is configurable and determined by the failover properties for the virtual machine.

Reference: Add-ClusterVMMonitoredItem

QUESTION 212

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed.

You are creating a file management task as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that the Include all folders that store the following kinds of data list displays an entry named Corporate Data.

What should you do?

A.

Create a new file group.

B.

Create a new classification property.

C.

Modify the properties of the System Files file group.

D.

Modify the Folder Usage classification property.

Correct Answer: B

Explanation:

Classification properties are used to assign values to files.

Reference: Working with File Classification

QUESTION 213

You have a failover cluster named Cluster1 that contains four nodes. All of the nodes run Windows Server 2012 R2. You need to schedule the installation of Windows updates on the cluster nodes. Which tool should you use?

A.

the Add-CauClusterRole cmdlet

B.

the Wusa command

C.

the Wuauclt command

D.

the Invoke-CauScan cmdlet

Correct Answer: A

Explanation:

To enable self-updating mode, the CAU clustered role must also be added to the failover cluster. To do this by using the CAU UI, under Cluster Actions, use the Configure Self- Updating Options action. Alternatively, run the Add-CauClusterRole Windows PowerShell cmdlet.

Note: The process for installing service packs and hotfixes on Windows Server 2012 differs from the process in earlier versions. In Windows Server 2012, you can use the Cluster-Aware Updating (CAU) feature. CAU automates the software-updating process on clustered servers while maintaining availability.

Reference: Cluster-Aware Updating Overview

QUESTION 214

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server
2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 has access to four physical disks. The disks are configured as shown in the following table.

You need to ensure that all of the disks can be added to a Cluster Shared Volume (CSV).

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.

Format Disk2 to use NTFS.

B.

Format Disk3 to use NTFS.

C.

Enable BitLocker on Disk4.

D.

Disable BitLocker on Disk1.

Correct Answer: AD

QUESTION 215

You configure the nodes to use the port rule shown in the exhibit. (Click the Exhibit button.)

You need to configure the NLB cluster to meet the following requirements:

HTTPS connections must be directed to Server1 if Server1 is available.

HTTP connections must be load balanced between the two nodes.

Which three actions should you perform? Each correct answer presents part of the solution. Choose three.

A.

From the host properties of Server2, set the Handling priority of the existing port rule to 2.

B.

Create a port rule for TCP port 80. Set the Filtering mode to Multiple host and set the Affinity to None.

C.

Create an additional port rule for TCP port 443. Set the Filtering mode to Multiple host and set the Affinity to Single.

D.

From the host properties of Server1, set the Handling priority of the existing port rule to 2.

E.

From the host properties of Server2, set the Priority (Unique host ID) value to 1.

F.

From the host properties of Server1, set the Handling priority of the existing port rule to 1.

Correct Answer: ABD

Explanation:

Handling priority: When Single host filtering mode is being used, this parameter specifies the local host’s priority for handling the networking traffic for the associated port rule. The host with the highest handling priority (lowest numerical value) for this rule among the current members of the cluster will handle all of the traffic for this rule. The allowed values range from 1, the highest priority, to the maximum number of hosts allowed (32). This value must be unique for all hosts in the cluster.

A (not F): Lower priority (2) for Server 2.

B: HTTP is port 80.

Multiple hosts. This parameter specifies that multiple hosts in the cluster handle network traffic for the associated port rule. This filtering mode provides scaled performance in addition to fault tolerance by distributing the network load among multiple hosts. You can specify that the load be equally distributed among the hosts or that each host handle a specified load weight.

Reference: Network Load Balancing parameters

QUESTION 216

A user named User1 is a member of the local Administrators group on Node1 and Node2.

User1 creates a new clustered File Server role named File1 by using the File Server for general use option.

A report is generated during the creation of File1 as shown in the exhibit. (Click the Exhibit button.)

File1 fails to start.

You need to ensure that you can start File1.

What should you do?

A.

Log on to the domain by using the built-in Administrator for the domain, and then recreate the clustered File Server role by using the File Server for general use option.

B.

Assign the user account permissions of User1 to the Servers OU.

C.

Assign the computer account permissions of Cluster2 to the Servers OU.

D.

Increase the value of the ms-DS-MachineAccountQuota attribute of the domain.

E.

Recreate the clustered File Server role by using the File Server for scale-out application data option.

Correct Answer: B

Explanation:

* You can deploy and configure a clustered file server by using either of the following methods:

/ Scale-Out File Server for application data

/ File Server for general use

* Scale-Out File Server is a feature that is designed to provide scale-out file shares that are continuously available for file-based server application storage. Scale-out file shares provides the ability to share the same folder from multiple nodes of the same cluster.

Reference: Scale-Out File Server for Application Data Overview

QUESTION 217

You are employed as a network administrator at ABC.com. ABC.com has an Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed. ABC.com has a server, named ABC-SR07, which is configured as a DHCP server. You have created a superscope on ABC-SR07. Which of the following describes a reason for creating a superscope? (Choose all that apply.)

A.

To support DHCP clients on a single physical network segment where multiple logical IP networks are used.

B.

To allow for the sending of network traffic to a group of endpointsdestination hosts.

C.

To support remote DHCP clients located on the far side of DHCP and BOOTP relay agents.

D.

To provide fault tolerance.

Correct Answer: AC

QUESTION 218

You are employed as a network administrator at ABC.com. ABC.com has an Active Directory domain named ABC.com. All servers, including domain controllers, on the ABC.com network have Windows Server 2012 installed. ABC.com has a domain controller, named ABC-DC01, which is configured as a DNS server. You are planning to unsign the ABC.com zone. Why should you unsign the zone?

A.

To remove the zone.

B.

To change the current zone type.

C.

To add a new primary zone.

D.

To create an Active Directory-integrated zone.

Correct Answer: B

QUESTION 219

You are employed as a network administrator at ABC.com. ABC.com has an Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed. ABC.com has a server named ABC-SR01, which hosts the IP Address Management (IPAM) Server feature. ABC.com also has a server, named ABC-SR02, which is configured as a DHCP server. You have been instructed to make sure that a user, named Mia Hamm, who belongs to the IPAM Users group on ABC-SR01, has the ability to modify the DHCP scopes on ABC-SR02 by making use of use IPAM. You want to achieve this without assigning Mia Hamm any unnecessary permissions. Which of the following actions should you take?

A.

You should consider making Mia Hamm a member of the DHCP Administrators group on ABC- SR02.

B.

You should consider making Mia Hamm a member of the IPAM Administrators group on ABC- SR02.

C.

You should consider making Mia Hamm a member of the Local Administrators group on ABC- SR02.

D.

You should consider making Mia Hamm a member of the Domain Administrators group.

Correct Answer: A

QUESTION 220

You are employed as a senior network administrator at ABC.com. ABC.com has an Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed. You are currently running a training exercise for junior network administrators. You are discussing the DNSSEC NRPT rule property. Which of the following describes the purpose of this rule property?

A.

It is used to indicate the namespace to which the policy applies.

B.

It is used to indicate whether the DNS client should check for DNSSEC validation in the response.

C.

It is used to indicate DNSSEC must be used to protect DNS traffic for queries belonging to the namespace.

D.

It is used to whether DNS connections over DNSSEC will use encryption.